All releases of Tor

Release Notes: This release backports numerous high-priority fixes from the Tor 0.2.5 alpha release series. These include blocking all authority signing keys that may have been affected by the OpenSSL "heartbleed" bug, choosing a far more secure set of TLS ciphersuites by default, closing a couple of memory leaks that could be used to run a target relay out of RAM, and several others.

Release Notes: This release fixes potentially poor random number generation for users who use OpenSSL 1.0.0
or later,
set "HardwareAccel 1" in their torrc file,
have "Sandy Bridge" or "Ivy Bridge" Intel
processors,
and have no state file in their DataDirectory (as would happen on first start).
Users who generated relay or hidden service identity keys in such a situation should discard
them and generate new ones.

Release Notes: This release features a new circuit handshake and link encryption that use ECC to provide better security and efficiency; makes relays better manage circuit
creation requests; uses "directory guards" to reduce client enumeration risks; makes bridges collect and report statistics about the pluggable
transports they support; and cleans up and improves the geoip database. The release also includes many stability,
security, and privacy fixes.

Release Notes: This release is the fourth release candidate for the Tor 0.2.4.x
series. It takes a variety of fixes from the 0.2.5.x branch to improve
stability, performance, and better handling of edge cases.

Release Notes: This release introduces experimental support for syscall sandboxing on Linux, allows bridges that offer pluggable transports to report usage statistics, fixes many issues to make testing easier, and provides
a pile of minor features and bugfixes that have been waiting for a release of the new branch.

Release Notes: This release reduces directory overhead, provides enormous crypto performance improvements for fast relays on recent hardware, a new v3 TLS handshake protocol that can better resist fingerprinting, support for protocol obfuscation plugins, better scalability for hidden services, IPv6 support for bridges, performance improvements like allowing clients to skip the first round-trip on the circuit ("optimistic data") and refilling token buckets more often, a new "stream isolation" design
to isolate different applications on different circuits, and many stability, security, and privacy fixes.